exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

netvigilance-sa10.txt

netvigilance-sa10.txt
Posted Jan 18, 2007
Authored by Jesper Jurcenoks | Site netvigilance.com

dt_guestbook version 1.0f suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 17cf6b79792b56a674096df1d161c8ee9cc218554017aab90771160c917c8b89

netvigilance-sa10.txt

Change Mirror Download
netVigilance Security Advisory #10

dt_guestbook version 1.0f XSS vulnerability

Description:
dt_guestbook is a fully-featured message board system with admin interface. Due to program flaws it is possible for the remote attacker to conduct XSS attacks.
The remote attacker can convince the victim to open a specially crafted link that is a trusted guestbook server and execute arbitrary code in the user’s browser session.

External References:
Mitre CVE: CVE-2006-6487 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6487
NVD NIST: CVE-2006-6487 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-6487
OSVDB: 30787 http://www.osvdb.com/displayvuln.php?osvdb_id=30787

Summary:
dt_guestbook a fully-featured message board system with admin interface.
A security problem in the product allows attackers to conduct XSS attacks.
This vulnerability can be exploited only when PHP register_globals is On.

Release Date:


Severity:
Risk: Medium

CVSS Metrics
Access Vector: Remote
Access Complexity: High
Authentication: not-required
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial
Impact Bias: Normal
CVSS Base Score: 5.6

Target Distribution on Internet: Low

Exploitability: Functional Exploit
Remediation Level: Workaround
Report Confidence: Uncorroborated

Vulnerability Impact: Attack
Host Impact: cross-site scripting.


SecureScout Testcase ID:
TC 17940


Vulnerable Systems:
dt_guestbook 1.0f.

Vulnerability Type:
XSS (Cross-Site Scripting) to force a web-site to display malicious contents to the target, by sending a specially crafted request to the web-site. The vulnerable web-site is not the target of attack but is used as a tool for the hacker in the attack of the victim.

Vendor Status: Author Alexander Fedorov was notified on Dec 8 2006 and agreed to correct the XSS in his product. He has failed to respond to emails or Chat since Dec 8 2006.
.
Solution: Patch Possibly Pending from Vendor, please check http://fedorov.vitalain.ru for updates.
.
Workaround:
Set PHP register_globals to Off.
Example:
HTTP REQUEST http://[TARGET]/[dt_guestbook_v1-directory]/index.php?submit=1&error[]=%3Cscript%3Ealert(document.cookie)%3C/script%3E
REPLY
...
will execute <script>alert(document.cookie)</script>
...

Advisory URL: http://www.netvigilance.com/advisory0009

Credits:
Jesper Jurcenoks
Co-founder netVigilance, Inc
www.netvigilance.com
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close